Explore our curated list of tools.
288 listed tools Last update on 2025-06-12
Recon: Information gathering stage, where attackers gather as much information as possible about the target.
Weaponization: Crafting of tools or payloads to exploit vulnerabilities.
Delivery: The transmission of the weaponized payload to the target.
Exploitation: Exploiting a vulnerability to gain access to the target system.
Installation: Establishing a foothold on the target system.
Command & Control (C2): Setting up channels for communication with the compromised system.
Actions on Objectives: Achieving the intended goal of the attack, such as data exfiltration or system disruption.
Commercial Open-source
Post-exploitation pentest tools to verify vulnerabilities, manage assessments, and more.
Open-source
USB or network program for printer security mapping & exploitation
Free
A Debian-based distro, boot from CD/USB, filters traffic through TOR and attempts trace cleanup after use
Open-source
Distro is organized around Penetration Testing Execution Standard (PTES)
Open-source
Perl script with DNS enumeration, zone transfer, dictionary attack, and reverse lookup functionality
Free
A digital archive providing historical snapshots of websites and other media for OSINT and research purposes
Open-source
Revived and enhanced DNS reconnaissance and enumeration tool, offering subdomain brute-forcing, email harvesting, and metadata analysis
Commercial Free
Web technology profiler used for OSINT, competitive analysis, and cyber reconnaissance
Free
Curated collection of open-source intelligence tools and resources, organized for targeted investigations across various domains
Open-source
Getallurls (gau) fetches known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl
Free Commercial
OSINT search engine and data archive indexing darknet, leaks, and public records
Commercial
Open-source intelligence and graphical link analysis tool for gathering and connecting information for intelligence and forensics.
Free Commercial
Email and network diagnostic platform offering tools for blacklist monitoring, DNS lookups, and email deliverability analysis
Open-source
Community-driven repository compiling OSINT tools and resources categorized by country, facilitating targeted open-source investigations
Free
Service by Qualys that performs deep analysis of SSL/TLS configurations for public web servers
Open-source
A subdomain discovery tool that discovers valid subdomains for websites by using passive online sources
Open-souce
Fast subdomain enumeration tool that uses OSINT sources and brute-force techniques to aid hunters in mapping domain footprints
Open-source
Analyze URLs and estimate entropies to find URLs that might be vulnerable to attack
Open-source
Accept line-delimited domains on stdin, fetch URLs from the Wayback Machine for *.domain and output them on stdout
Open-Source
Open-source website analysis tool to identify potential vulnerabilities and security misconfigurations
Free
Curated collection of open-source intelligence tools and resources, organized for targeted investigations across various domains
Commercial
Multiuser pentesting environment for red teams performing coop tests, security audits, and risk assessments.
Commercial Free
Web technology platform that identifies the tech stack of websites, aiding in reconnaissance and infrastructure analysis
Open-source
Reveal the specific modules, plugins, components, and themes run by CMS websites + associated vulnerabilities
Open-source
Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery
Free
Service to check if your email or phone number has been compromised in a data breach
Commercial
OSINT search engine and data archive for email, domain, IP, Bitcoin address, and more
Commercial
Adversary simulator with red-team, breach simulation, and purple team capabilities.
Open-source
Menu-driven tool for building distributed security events for red/blue/purple team drills
Commercial
A multi-processor disassembler and debugger with free/premium versions
Open-source
Toolchain for forensics, software reverse engineering, exploiting, debugging, etc.
Open-source
MITM attack framework used for phishing credentials and session cookies with 2-factor bypass
Open-source
Powerful, open-source phishing framework to simulate and manage phishing campaigns
Open-source
Create and manage simultaneous phishing attacks with server and content tools
Open-source
Automated phishing attacks against WiFi networks for red teaming or WiFi investigations
Commercial Free
Malware analysis service powered by CrowdStrike, offering in-depth behavioral reports and threat intelligence for submitted files and URLs
Commercial Free
Web sandbox and threat intelligence platform for scanning, analyzing, and archiving website behavior and malicious indicators
Commercial Free
Free online service aggregating multiple antivirus engines and tools to analyze files and URLs for malware, facilitating threat detection and intelligence sharing
Free Commercial
Community-driven IP address blacklist and threat intelligence platform for reporting and checking abusive IP activities
Open-access
Open Threat Exchange platform offering community-driven threat intelligence with real-time indicators of compromise (IoCs)
Free
Threat intelligence and research division of Cisco, providing real-time protection and insights into global cyber threats
Free
Internet intelligence platform offering real-time insights into global traffic, security threats, protocol adoption, and DNS trends
Free Commercial
Cybercrime intelligence platform specializing in infostealer malware data to detect and mitigate compromised credentials
Free Commercial
Cyber threat intelligence platform offering high-fidelity, actionable insights for detection, response, and protection
Open-source
Command and control server for delivering exploits
Commercial
An integrated platform for web-application pentesting (Free edition available)
Open-source
Brute-force over directories and web application server tool with hidden directory search
Open-source
Web server vuln scanner that performs comprehensive tests to identify dangerous files, outdated server software, and misconfigurations
Open-source
Audit for and automate injection attacks, exploit configuration weaknesses, and clone data
Open-source
Scriptable HTTP intercepting proxy and fuzzer for web applications
Free
Free tool for analyzing HTTP response headers to assess web application security posture and recommend improvements